Security News

DHS, Philips Issue Advisories for HealthSuite Android Health AppThe lack of strong encryption in Philips' HealthSuite Health Android app leaves the mobile health software vulnerable to hacking,...

Plug-and-play hardware lacks even basic functional security for crucial bootrom.

An update on the hacking of email accounts of four senior aides within the National Republican Congressional Committee leads the latest edition of the ISMG Security Report. Also featured: An...

Admit they are upping their use of mass snooping UK spies are planning to increase their use of bulk equipment interference, as the range of encrypted hardware and software applications they can't...

Patch Container-Orchestration System Now or Risk Serious ConsequencesA severe vulnerability in Kubernetes, the popular, open-source software for managing Linux applications deployed within...

Police forces across the UK are coming under increasing pressure to launch criminal investigations into incidents of social media and computer hacking, according to a new report from the...

A Quarter Million Devices Vulnerable to UPnProxy Botnet More than 270,000 Internet-connected devices run vulnerable implementations of UPnP and are susceptible to becoming part of a multi-purpose...

Ben-Gurion University researchers developed a device-focused cybersecurity solution to act as a last line of defense to protect patients.

VMware Fixes Vulnerability That Earned Researcher $100,000 at Hacking Contest VMware has patched a critical Workstation and Fusion vulnerability disclosed recently by a researcher at a hacking...

In the latest edition of the ISMG Security Report, Asaf Ashkenazi of the mobile security firm Inside Secure discusses new threats to car security posed by certain smartphone apps. Plus, updates on...